Author of the publication

Scalable approximations to k-cycle transversal problems on dynamic networks.

, , and . Knowl. Inf. Syst., 61 (1): 65-84 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The walls have ears: optimize sharing for visibility and privacy in online social networks., , and . CIKM, page 1452-1461. ACM, (2012)Optimal Auditing on Smart-Grid Networks., , , and . ICC, page 1-6. IEEE, (2018)Monitor placement to timely detect misinformation in Online Social Networks., , , and . ICC, page 1152-1157. IEEE, (2015)Assessing attack vulnerability in networks with uncertainty., and . INFOCOM, page 2380-2388. IEEE, (2015)Analysis of misinformation containment in online social networks., , and . Comput. Networks, 57 (10): 2133-2146 (2013)An optimal algorithm for coverage hole healing in hybrid sensor networks., , , and . IWCMC, page 494-499. IEEE, (2011)Efficient Multi-Link Failure Localization Schemes in All-Optical Networks., , , and . IEEE Trans. Commun., 61 (3): 1144-1151 (2013)On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability., , , and . IEEE/ACM Trans. Netw., 21 (3): 963-973 (2013)A hybrid ABC-TS algorithm for the unrelated parallel-batching machines scheduling problem with deteriorating jobs and maintenance activity., , , , and . Appl. Soft Comput., (2018)Preserving Differential Privacy in Adversarial Learning with Provable Robustness., , , , and . CoRR, (2019)